@@ -319,7 +319,8 @@ In GitLab, create the following [CI/CD variables](../variables/_index.md#for-a-p
...
@@ -319,7 +319,8 @@ In GitLab, create the following [CI/CD variables](../variables/_index.md#for-a-p
to provide details about your Vault server:
to provide details about your Vault server:
-`VAULT_SERVER_URL` - The URL of your Vault server, for example `https://vault.example.com:8200`.
-`VAULT_SERVER_URL` - The URL of your Vault server, for example `https://vault.example.com:8200`.
-`VAULT_AUTH_ROLE` - Optional. The role to use when attempting to authenticate. If no role is specified,
-`VAULT_AUTH_ROLE` - Optional. Name of the Vault JWT Auth role to use when attempting to authenticate. In this tutorial,
we already created two roles with the names `myproject-staging` and `myproject-production`. If no role is specified,
Vault uses the [default role](https://developer.hashicorp.com/vault/api-docs/auth/jwt#default_role)
Vault uses the [default role](https://developer.hashicorp.com/vault/api-docs/auth/jwt#default_role)
specified when the authentication method was configured.
specified when the authentication method was configured.
-`VAULT_AUTH_PATH` - Optional. The path where the authentication method is mounted.
-`VAULT_AUTH_PATH` - Optional. The path where the authentication method is mounted.
...
@@ -340,7 +341,7 @@ job_with_secrets:
...
@@ -340,7 +341,7 @@ job_with_secrets:
aud:https://vault.example.com
aud:https://vault.example.com
secrets:
secrets:
STAGING_DB_PASSWORD:
STAGING_DB_PASSWORD:
vault:secret/myproject/staging/db/password@secrets# authenticates using $VAULT_ID_TOKEN
vault:myproject/staging/db/password@secret# translates to a path of 'secret/myproject/staging/db' and field 'password'. Authenticates using $VAULT_ID_TOKEN.